Study Identifies Vulnerability in Apple M-Series Chips Allowing Hackers to Retrieve Private Keys

According to CryptoPotato, a recent study has identified a vulnerability in Apple's M-s

2024-03-23 16:38:41   作者:  Pluto2023

According to CryptoPotato, a recent study has identified a vulnerability in Apple's M-series chips that could enable hackers to retrieve the cryptographic private keys of Mac users. The vulnerability functions as a side channel, allowing the extraction of end-to-end keys when Apple chips execute implementations of commonly used cryptographic protocols. Due to its origin in the microarchitectural structure of the silicon, direct patching is not feasible, unlike traditional vulnerabilities. Instead, the report suggests a fix that relies on integrating defenses into third-party cryptographic software. However, this approach may significantly degrade the performance of M-series chips during cryptographic tasks, particularly in earlier generations like M1 and M2. The researchers explained that the exploitation of the vulnerability occurs when both the targeted cryptographic operation and a malicious application, operating with standard user system privileges, are processed on the same CPU cluster. The latest research sheds light on an overlooked phenomenon regarding DMPs within Apple silicon. In certain cases, these DMPs misinterpret memory content, including critical key material, as the pointer value used for loading other data. As a result, the DMP frequently accesses and interprets this data as an address, leading to memory access attempts. This process, known as 'dereferencing' of 'pointers,' involves reading data and inadvertently leaking it through a side channel, representing a clear breach of the constant-time paradigm. The researchers identified this hack as a 'GoFetch' exploit, explaining that it operates on the same user privileges as most third-party applications, exploiting vulnerabilities in clusters of M-series chips. It affects classical and quantum-resistant encryption algorithms alike, with extraction times varying from minutes to hours depending on the key size. Despite previous knowledge of similar threats, the researchers said that GoFetch demonstrates more aggressive behavior in Apple's chips, posing a significant security risk.

查看原始新闻

登录或注册发表您的评论

可能感兴趣的贴文

BakerySwap Completes Refunds for PUMP Presale Participants
According to PANews, BakerySwap has announced that refunds for the previously participated PUMP presale have been completed for all valid BNB, BAKE, and CAKE holders. It is important to note that BNB has been converted to wBNB, but can be exchanged back to BNB at a 1:1 ratio. Additionally, IQ50 w……
Friend.tech Plans to Distribute Investor Shares to Users
According to Foresight News, Web3 social platform friend.tech announced its plan to distribute shares held by venture capitalists, including Paradigm, to its users. Previously, Foresight News reported that friend.tech stated that after a meeting discussion, its investors had agreed to give up the……
今日恐慌与贪婪指数为73,等级为贪婪
据币安数据显示,今日恐慌与贪婪指数为73(昨日为75),等级为贪婪。查看原始新闻……
两个疑似同一人的ETH波段地址累计亏损228万美元
据Odaily星球日报报道,链上分析师AI姨监测到,过去七天,两个疑似归属于同一人的ETH波段地址已累计亏损228万美元。其中,地址0x6c1...a6062亏损80万美元,地址0x248...87976亏损148万美元。查看原始新闻……

其他加密货币(Cryptocurrency)社区

对于其他加密货币的统称,包含稳定币,竞争币……如USDT,USDC,BNB(币安币)ETC(以太坊经典)……


社区规则

禁止人身攻击、暴力威胁、八卦、任何形式的诽谤、发布人们的私人信息。

禁止误导性标题宣传

禁止产品和项目促销

仅限中文,对于非中文的文章请提供来源链接以及准确的翻译